Login / Signup
Tracing Network Attacks to Their Sources.
Tatsuya Baba
Shigeyuki Matsuda
Published in:
IEEE Internet Comput. (2002)
Keyphrases
</>
network attacks
intrusion detection
network intrusion detection
network security
intrusion detection system
information sources
data sources
dos attacks
network intrusions
database
real world
data model
data mining
information systems
training data
reinforcement learning